A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems

M Eceiza, JL Flores, M Iturbe - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

Nyx-net: network fuzzing with incremental snapshots

S Schumilo, C Aschermann, A Jemmett… - Proceedings of the …, 2022 - dl.acm.org
Coverage-guided fuzz testing (" fuzzing") has become mainstream and we have observed
lots of progress in this research area recently. However, it is still challenging to efficiently test …

Automatic firmware emulation through invalidity-guided knowledge inference

W Zhou, L Guan, P Liu, Y Zhang - 30th USENIX Security Symposium …, 2021 - usenix.org
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

Sok: Enabling security analyses of embedded systems via rehosting

A Fasano, T Ballo, M Muench, T Leek… - Proceedings of the …, 2021 - dl.acm.org
Closely monitoring the behavior of a software system during its execution enables
developers and analysts to observe, and ultimately understand, how it works. This kind of …

Greenhouse:{Single-Service} Rehosting of {Linux-Based} Firmware Binaries in {User-Space} Emulation

HJ Tay, K Zeng, JM Vadayath, AS Raj… - 32nd USENIX Security …, 2023 - usenix.org
As IoT devices grow more widespread, scaling current analysis techniques to match
becomes an increasingly critical task. Part of this challenge involves not only rehosting the …

A Friend's Eye is A Good Mirror: Synthesizing {MCU} Peripheral Models from Peripheral Drivers

C Lei, Z Ling, Y Zhang, Y Yang, J Luo… - 33rd USENIX Security …, 2024 - usenix.org
The extensive integration of embedded devices within the Internet of Things (IoT) has given
rise to significant security concerns. Various initiatives have been undertaken to bolster the …

[PDF][PDF] Forming Faster Firmware Fuzzers.

L Seidel, DC Maier, M Muench - USENIX Security Symposium, 2023 - usenix.org
A recent trend for assessing the security of an embedded system's firmware is rehosting, the
art of running the firmware in a virtualized environment, rather than on the original hardware …